Packet No.
|
Packet Contents
|
Explanation
|
1 |
10.0.0.11.telnet > 10.0.0.120.1230 E..h..@.@.i........x.....L....8.P...U2..Red.Hat .Linux.release.8.0.(Psyche)..Kernel
|
This is the server
showing the telnet banner |
2 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
3 |
10.0.0.11.telnet > 10.0.0.120.1230 E../..@.@.iH.......x.....L....8.P.......login:.
|
This is the server
asking for the username |
4 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
5 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L..P.C.....d.....
|
telnet transfers the
username 1 character at a time. Here the client is sending the 1st
character of the username. |
6 |
10.0.0.11.telnet > 10.0.0.120.1230 E..)..@.@.iM.......x.....L....8.P.......d
|
The server echoes the
1st character |
7 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
8 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L..P.C.....e.....
|
The client sends the
2nd username character |
9 |
10.0.0.11.telnet > 10.0.0.120.1230 E..)..@.@.iL.......x.....L....8.P.......e
|
The server echoes the
2nd character |
10 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
11 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L..P.C.....m.....
|
The client sends the
3rd username character |
12 |
10.0.0.11.telnet > 10.0.0.120.1230 E..)..@.@.iK.......x.....L....8.P.......m
|
The server echoes the
3rd character |
13 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
14 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L..P.C.....o.....
|
The client sends the
4th username character |
15 |
10.0.0.11.telnet > 10.0.0.120.1230 E..)..@.@.iJ.......x.....L....8.P.......o
|
The server echoes the
4th character. And there we see the username is "demo" |
16 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
17 |
10.0.0.120.1230 > 10.0.0.11.telnet E..*..@...F....x..........8..L..P.C...........
|
18 |
10.0.0.11.telnet > 10.0.0.120.1230 E..*..@.@.iH.......x.....L....8.P.........
|
19 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L..P.C...........
|
20 |
10.0.0.11.telnet > 10.0.0.120.1230 E..2..@.@.i?.......x.....L....8.P...;...Password:.
|
Here the server is
asking for the password |
21 |
10.0.0.120.1230 > 10.0.0.11.telnet E..(..@...F....x..........8..L.#P.C...........
|
22 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....s.....
|
Here we start seeing
it! Here is the 1st character of the password sent by the client to the
server! |
23 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iH.......x.....L.#..8.P...#...
|
The server does not
echo the character back, but that doesn't help keep the password safe. |
24 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....e.....
|
The client sends the
2nd password character |
25 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iG.......x.....L.#..8.P...#...
|
26 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....c.....
|
The client sends the
3rd password character |
27 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iF.......x.....L.#..8.P...#...
|
28 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....r.....
|
The client sends the
4th password character |
29 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iE.......x.....L.#..8.P...#...
|
30 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....e.....
|
The client sends the
5th password character |
31 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iD.......x.....L.#..8.P...#...
|
32 |
10.0.0.120.1230 > 10.0.0.11.telnet E..)..@...F....x..........8..L.#P.C.....t.....
|
The client sends the
6th password character. Now we can see the password of "secret" |
33 |
10.0.0.11.telnet > 10.0.0.120.1230 E..(..@.@.iC.......x.....L.#..8.P...#...
|